, National Institute of Standards and Technology (NIST), FIPS PUB 197, 2001.
Differential cryptanalysis of DES-like cryptosystems, CRYPTO'90, vol.537, pp.2-21, 1991. ,
Differential cryptanalysis of Feal and N-hash, EUROCRYPT'91, vol.547, pp.1-16, 1991. ,
A toolbox for cryptanalysis: Linear and affine equivalence algorithms, EURO-CRYPT 2003, vol.2656, pp.33-50, 2003. ,
Cryptanalysis of Feistel networks with secret round functions, SAC 2015, vol.9566, pp.102-121, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01243130
On reverse-engineering S-boxes with hidden design criteria or structure, CRYPTO 2015, Part I. LNCS, vol.9215, pp.116-140, 2015. ,
Reverse-engineering the S-box of streebog, kuznyechik and STRIBOBr1, EURO-CRYPT 2016, Part I. LNCS, vol.9665, pp.372-402, 2016. ,
Structural cryptanalysis of SASAS, EUROCRYPT 2001, vol.2045, pp.394-405, 2001. ,
Differential properties of ? ? 2 ?1 ,
URL : https://hal.archives-ouvertes.fr/hal-00610099
, IEEE Transactions on Information Theory, vol.57, issue.12, pp.8127-8137, 2011.
Anomalies and vector space search: Tools for S-box analysis (full version), vol.528, 2019. ,
On the influence of the algebraic degree of ?1 on the algebraic degree of ?, IEEE Transactions on Information Theory, vol.59, issue.1, pp.691-702, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00738398
Boomerang uniformity of popular S-box constructions, WCC 2019: The Eleventh International Workshop on Coding and Cryptography, 2019. ,
An APN permutation in dimension six, Post-proceedings of the 9-th International Conference on Finite Fields and Their Applications, vol.518, pp.33-42, 2010. ,
Finding nonnormal bent functions, Discrete Applied Mathematics, vol.154, issue.2, pp.202-218, 2006. ,
On CCZ-equivalence, extended-affine equivalence, and function twisting, Finite Fields and Their Applications, vol.56, pp.209-246, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01953349
Codes, bent functions and permutations suitable for DES-like cryptosystems, Designs, Codes and Cryptography, vol.15, issue.2, pp.125-156, 1998. ,
Boomerang connectivity table: A new cryptanalysis tool, EUROCRYPT 2018, Part II, vol.10821, pp.683-714, 2018. ,
Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, issue.3, pp.221-242, 2007. ,
, SageMath, the Sage Mathematics Software System, 2017.
SMS4 encryption algorithm for wireless networks, Cryptology ePrint Archive, vol.329, 2008. ,
An improved affine equivalence algorithm for random permutations, EUROCRYPT 2018, Part I. LNCS, vol.10820, pp.413-442, 2018. ,
, Federal Agency on Technical Regulation and Metrology: Information technology -data security: Hash function, 2012.
, Federal Agency on Technical Regulation and Metrology: Information technology -data security: Block ciphers, 2015.
, EUROCRYPT'93, vol.765, 1994.
A method for generation of highnonlinear s-boxes based on gradient descent, Cryptology ePrint Archive, vol.578, 2013. ,
New results about the boomerang uniformity of permutation polynomials, 2019. ,
Analysis of the SMS4 block cipher, ACISP 07, vol.4586, pp.158-170, 2007. ,
On Networks Consisting of Functional Elements with Delays, pp.43-83, 1973. ,
Linear cryptanalysis method for DES cipher, pp.386-397 ,
Key-recovery attacks on ASASA, Journal of Cryptology, vol.31, issue.3, pp.845-884, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01245381
Differentially uniform mappings for cryptography, pp.55-64 ,
On the distribution of characteristics in bijective mappings, pp.360-370 ,
Properties of linear approximation tables, FSE'94, vol.1008, pp.131-136, 1995. ,
Partitions in the S-box of Streebog and Kuznyechik, IACR Trans. Symm. Cryptol, vol.2019, issue.1, pp.302-329, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02396814
Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem, CRYPTO 2016, Part II, vol.9815, pp.93-122, 2016. ,
S-Boxes used in cryptographic schemes, 2017. ,
Reverse engineering of chiasmus from gstool. Presentation at the Chaos Computer Club (CCC), 2013. ,
Reverse engineering of chiasmus from gstool. Presentation at the HGI-Kolloquium, 2014. ,
The synthesis of two-terminal switching circuits, The Bell System Technical Journal, vol.28, issue.1, pp.59-98, 1949. ,
A known plaintext attack of FEAL-4 and FEAL-6, CRYPTO'91, vol.576, pp.172-181, 1992. ,
The boomerang attack, FSE'99, vol.1636, pp.156-170, 1999. ,